EMC Data Protection Advisor 6.3.x before patch 67 and 6.4.x before patch 130 contains undocumented accounts with hard-coded passwords and various privileges. Affected accounts are: "Apollo System Test", "emc.dpa.agent.logon" and "emc.dpa.metrics.logon". An attacker with knowledge of the password could potentially use these accounts via REST APIs to gain unauthorized access to EMC Data Protection Advisor (including potentially access with administrative privileges).
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/Sep/36 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/100846 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039370 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2017/Sep/36 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/100846 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039370 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2017/Sep/36 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/100846 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039370 - Third Party Advisory, VDB Entry |
Information
Published : 2018-03-16 20:29
Updated : 2024-11-21 03:33
NVD link : CVE-2017-8013
Mitre link : CVE-2017-8013
CVE.ORG link : CVE-2017-8013
JSON object : View
Products Affected
emc
- data_protection_advisor
CWE
CWE-798
Use of Hard-coded Credentials